1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yan [13]
3 years ago
13

Write a Tip Calculator in code in VMware Fusion

Computers and Technology
1 answer:
lisabon 2012 [21]3 years ago
7 0

final \: amount \times percent \: of \: tip = tip \: amount
You might be interested in
Under which access control system is each piece of information and every system resource (files, devices, networks, and so on) l
Pani-rosa [81]

Answer:

C. Mandatory access control

Explanation:

In the implementation of computer security, the mandatory access control (MAC) refers to the implementation of a security feature by operating systems. In this method, individual resource owners’ are unable to deny or grant permissions to a resources contained in a file. The criteria in a MAC when defined by the system administrator is implemented and enforced by the OS.

7 0
3 years ago
Set of general format used to write program in any programming language?​
Novosadov [1.4K]

Answer:

hope you find it right

Explanation:

The process of writing computer instructions in a programming language is known as Coding.

A computer program is usually written by a computer programmer in a programming language. From the program in its human-readable form of source code, a compiler can derive machine code—a form consisting of instructions that the computer can directly execute.

That line of code is written in the Python programming language. Put simply, a programming (or coding) language is a set of syntax rules that define how code should be written and formatted. Thousands of different programming languages make it possible for us to create computer software, apps and websites.

In programming, code (noun) is a term used for both the statements written in a particular programming language - the source code , and a term for the source code after it has been processed by a compiler and made ready to run in the computer - the object code .

5 0
3 years ago
Can someone please help its late
Mkey [24]

Answer:

The correct answer to this question is given below in the explanation section.

Explanation:

The labels to AS engine are given below from left to right respectively.

  1. Fan
  2. Compressor
  3. Combustion
  4. Turbine
  5. Mixer
  6. Nozzle

Fan: Drawer air into the engine

Compressor: Compressor spins the air very fast. This sequeezes or compresses the air

Combustion: Air and fuel are mixed together and ignited in the combustor and it gets super hot and gas expanded.

Turbine: The hot gases enter the turbine, causing the blade on it to spin.

Mixer: The mixer combines the hot air with outside air in the engine. This reduces the heat and noise that is coming from the engine.

Nozzle: nozzle is where the exhaust is coming out from the engine, creating thrust. It works according to newton's third law.

3 0
3 years ago
Harmful or malicious pages should always get a page quality (PQ) rating of Lowest in rating
Serga [27]

Harmful or malicious pages should always get a page quality (PQ) rating of Lowest in rating is a true statement.

<h3>What is a malicious webpage?</h3>

A malicious website is known to be any kind of website that is set up to bring about harm such as a phishing website.

Note that low rating of Harmful or malicious pages  will make people realize that the site is not to be trusted and people will desist from using it.

Learn more about malicious pages fromhttps://brainly.com/question/23294592

3 0
3 years ago
You are frustrated to find that the only way to contact the customer service department is to make a phone call. The number list
Mademuasel [1]

Answer:

Option A; MINING THE SOCIAL MEDIA INPUTS.

Explanation:

Customer relationship management (CRM) is an approach to manage a company's interaction with current and potential customers. It uses data analysis about customers' history with a company to improve business relationships with customers, specifically focusing on customer retention and ultimately driving sales growth.

Social media mining is the process of obtaining big data from user-generated content on social media sites and mobile apps in order to extract patterns, form conclusions about users, and act upon the information, often for the purpose of advertising to users or conducting research.

The number listed from phone call would result in long distance charges to your phone bill, therefore, the issue of MINING THE SOCIAL MEDIA INPUTS should be addressed by the company to keep its CRM in line with your expectations.

3 0
3 years ago
Other questions:
  • What do we call the distribution and access of illegal copies of digital books??
    10·1 answer
  • What does a contain after the following code runs?int[] a = {1, 3, 7, 0, 0, 0};int size = 3, capacity = 6, value = 5;int pos = 0
    10·1 answer
  • Which type of financial institution typically has membership requirements?
    11·1 answer
  • Which system procedure is normally done with both hand valves opened on a gauge manifold connected to a refrigeration system?
    7·1 answer
  • # q7 - create function readFileFirstLast() to meet the conditions below
    10·1 answer
  • PLZ HELP
    15·2 answers
  • 1. Which sentence best expresses the main idea
    12·1 answer
  • Write a program that reads an integer, a list of words, and a character. The integer signifies how many words are in the list. T
    6·1 answer
  • The people on this platform are unbelievably nice. its almost rare to see this type of kindness online these days. Just wanted t
    14·1 answer
  • In what year was the earliest documented use of the word computer?.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!